Sciweavers

902 search results - page 71 / 181
» Immunization of Geographical Networks
Sort
View
ASIAN
2005
Springer
150views Algorithms» more  ASIAN 2005»
15 years 7 months ago
ACB-R: An Adaptive Clustering-Based Data Replication Algorithm on a P2P Data-Store
Replication on geographically distributed, unreliable, P2P interconnecting nodes can offer high data availability and low network latency for replica access. The challenge is how ...
Junhu Zhang, Dongqing Yang, Shiwei Tang
SRDS
2008
IEEE
15 years 8 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
ICAC
2006
IEEE
15 years 7 months ago
Collaborative Self-Organization by Devices Providing Document Services - A Multi-Agent Perspective
— In a service oriented environment such as the realm of document services, the conventional notion is that of a multi-function device interacting individually with customer appl...
Nathan Gnanasambandam, Naveen Sharma, Soundar R. T...
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
15 years 7 months ago
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
This paper presents a high-availability system architecture called INDRA — an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor ...
Weidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmo...
109
Voted
ICDM
2010
IEEE
105views Data Mining» more  ICDM 2010»
14 years 11 months ago
On the Vulnerability of Large Graphs
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as possible against a computer virus attack? We need (...
Hanghang Tong, B. Aditya Prakash, Charalampos E. T...